1. Trang chủ
  2. » Luận Văn - Báo Cáo

Báo cáo hóa học: " Research Article Localized Mode DFT-S-OFDMA Implementation Using Frequency and Time Domain Interpolation" doc

9 297 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 9
Dung lượng 2,02 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Volume 2009, Article ID 750534, 9 pagesdoi:10.1155/2009/750534 Research Article Localized Mode DFT-S-OFDMA Implementation Using Frequency and Time Domain Interpolation Ari Viholainen,1Te

Trang 1

Volume 2009, Article ID 750534, 9 pages

doi:10.1155/2009/750534

Research Article

Localized Mode DFT-S-OFDMA Implementation Using

Frequency and Time Domain Interpolation

Ari Viholainen,1Tero Ihalainen,1Mika Rinne,2and Markku Renfors (EURASIP Member)1

1 Department of Communications Engineering, Tampere University of Technology, P.O Box 553, 33101 Tampere, Finland

2 Nokia Research Center, P.O Box 407, 00045 Helsinki, Finland

Correspondence should be addressed to Ari Viholainen,ari.viholainen@tut.fi

Received 3 September 2008; Revised 19 December 2008; Accepted 12 March 2009

Recommended by Ana Perez-Neira

This paper presents a novel method to generate a localized mode single-carrier frequency division multiple access (SC-FDMA) waveform Instead of using DFT-spread OFDMA (DFT-S-OFDMA) processing, the new structure called SCiFI-FDMA relies on frequency and time domain interpolation followed by a user-specific frequency shift SCiFI-FDMA can provide signal waveforms that are compatible to DFT-S-OFDMA In addition, it provides any resolution of user bandwidth allocation for the uplink multiple access with comparable computational complexity, because the DFT is avoided Therefore, SCiFI-FDMA allows a flexible choice

of parameters appreciated in broadband mobile communications in the future

Copyright © 2009 Ari Viholainen et al This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

1 Introduction

OFDMA is a multiple access technique that inherits many

attractive features of the orthogonal frequency division

multiplexing (OFDM) transmission [1, 2] However, as a

multicarrier signal waveform, it suffers from a high

peak-to-average power ratio (PAPR) and hence leads to power

inefficiency, which has serious consequences for an uplink

transmission [3]

Recently single-carrier frequency division

multiple-access (SC-FDMA) transmission by DFT-spread OFDMA

(DFT-S-OFDMA) has drawn increasing attention because

it enables frequency-domain equalization (FDE), advanced

receiver techniques, and low PAPR [4,5] Low PAPR is due

to a serially modulated single-carrier block-transmission,

where the dynamic range of the transmitted signal’s

instan-taneous power is considerably smaller compared to

mul-ticarrier transmission on parallel subcarriers The lower

PAPR reduces the necessary back-off of the nonlinear power

amplifier, required to keep the spectral regrowth and in-band

distortion at a tolerable level This property can be exploited

to improve the cell coverage or to extend the battery

active-time of the mobile terminal

Alternative techniques to generate the SC-FDMA

sig-nal include the DFT-S-OFDMA [6, 7], the DFT-spread

generalized multicarrier (DFT-S-GMC) [8], and the inter-leaved frequency division multiple access (IFDMA) [9] DFT-S-GMC is a frequency-domain technique, where the

M-point IFFT is replaced by an M-band inverse filter bank

transform IFDMA utilizes time-domain generation of the signal waveform using block-wise symbol repetition and a user-specific phase rotation Another interpretation is that IFDMA is equivalent to a distributed mode DFT-S-OFDMA with equidistant subcarrier mapping

DFT-S-OFDMA is a very elegant technique to generate the uplink transmission for a specific user However, the complexity of the DFT and the resulting resolution of the practical DFT sizes are issues for the implementation Thus, a communications standard like the 3GPP E-UTRA [10] limits the supported subset of the DFT sizes K For

bandwidth allocation, the standard defines a resource block

of 12 subcarriers (i.e., K is a multiple of 12 with radix

{2, 3, 5}) The motivation of this paper is to present a generic method to generate SC-FDMA waveform in such a manner that all values ofK are feasible yet with practical complexity.

Here, the IFFT sizeM is assumed to be a power-of-two but

the DFT size K may take all the values from 1 to  M/γ 

with γ being a small positive integer Compared to the

reference design, this method enhances flexibility to allocate bandwidth and provides reduced number of multiplications

Trang 2

for large majority of K values One drawback inherent in

the proposed structure is an approximation error, which

however can nicely be parametrized below the noise level

The rest of this paper is organized as follows InSection 2,

the frequency-domain generation of a single-user signal

based on DFT-S-OFDMA is reviewed Also, the motivation

for developing an alternative implementation solution for

the localized mode is addressed Section 3 describes an

efficient implementation, where initial frequency-domain

interpolation using a specific transform matrix is followed

by fractional time-domain interpolation and user-specific

frequency translation Hereafter, this structure is referred

to as SC-FDMA implementation using frequency and time

domain interpolation (SCiFI-FDMA) The numerical

anal-ysis of DFT-S-OFDMA and SCiFI-FDMA are presented

terms of the number of required multiplications and

addi-tions Section 5 compares the DFT-S-OFDMA and

SCiFI-FDMA techniques to generate an SC-SCiFI-FDMA signal in a

single-user scenario and in a multi-user (multiple access)

scenario The performance is compared by evaluating the

error vector magnitude (EVM) of the approximation error

inherent in the SCiFI-FDMA transmitter due to fractional

interpolation Finally, conclusions are drawn inSection 6

2 Localized Mode DFT-S-OFDMA

DFT-S-OFDMA is a frequency-domain precoding technique

to generate the SC-FDMA signal waveform In this paper, we

focus on the properties of the DFT-IFFT processing shown

and localized mode symbol mapping by simple change of

the subcarrier allocation Both transmission modes provide

signals with an envelope of a single-carrier transmission

This is beneficial in order to minimize the in-band distortion

and out-of-band emissions In general, the localized mode is

preferred in the practical systems due to various

imperfec-tions of the distributed mode The distributed mode signal

has been shown to be sensitive to the carrier frequency offsets

(caused by Doppler effects and/or mismatch of the

transmit-receive oscillators), phase noise, and imperfect power control

[11] The localized mode signal is far less sensitive to these

imperfections

2.1 Signal Model In the signal model of Figure 1, the

discrete Fourier transformed sequence is expressed as

A[k] =

K1

n =0

x[n]e − j((2π/K)nk), (1)

wherek =0, 1, , K −1 andx[n] is a length-K sequence of

symbols, commonly from a QAM alphabet The subcarrier

allocation specifies how the DFT-spread samples are mapped

to the frequency bins of the IFFT, that is, whether distributed

or localized transmission mode is used The output of the

IFFT is

y[m] = 1

M

M1

l =0

B[l]e j((2π/M)ml), (2)

. K-point

DFT

.

B

Subcarrier allocation

. M-point

IFFT

.

y

P/S

Figure 1: Frequency-domain realization of SC-FDMA signal

wherem =0, 1, , M −1 andB[l] is the length-M output

sequence of the subcarrier allocation block

In the localized mode, the DFT-spread samples are allocated to a set of contiguous frequency bins of the IFFT This results in the following subcarrier allocation:

B[l] =

A[s], ifl =(s + ξ) mod M,

where s = 0, 1, , K −1, ξ is a user-specific subcarrier

allocation offset (0 ≤ ξ ≤ M −1), and the mod stands for modulo operation The input-output relation of the localized mode DFT-S-OFDMA cannot be simplified as much as in the case of the distributed mode and this results in a higher implementation complexity

2.2 Implementation Complexity In the localized mode, the M-point IFFT can be efficiently implemented via the Split-Radix FFT algorithm requiring M(log2(M) − 3) + 4 real multiplications and 3M(log2(M) −1) + 4 real additions [12] The main challenge is theK-point DFT with arbitrary

values of K The direct computation of the DFT requires

3K2real multiplications This is because one complex mul-tiplication can be calculated with three real mulmul-tiplications and three real additions as shown in [12] A more efficient implementation is possible, if K can be factorized into a

small set of prime numbers Based on this principle, the number of real multiplications required for the K-point

DFT, can be reduced using the Cooley-Tukey algorithm to

3K

i k i l i, where K = i k l i

i [13] Even more efficient techniques, such as Prime Factor and Winograd Fourier transform algorithms, have been reported in the literature [14] However, these highly optimized algorithms are not necessarily practical to the SC-FDMA application due to complicated re-indexing of data and increased memory requirements On the other hand, very low-complexity techniques for a limited set of highly composite DFT sizes up to 1024 have been studied in [15], where the resulting computational complexities have been given in a table format Later on, these specific values are used for comparison and they are referred to as Murphy’s method

multipli-cations when the DFT complexity is estimated using the Cooley-Tukey algorithm and Murphy’s method The differ-ent curves indicate the cases where the DFT size is a prime number, a number with a specific radix representation, and a specific value that is feasible in Murphy’s method,

Trang 3

10 2

10 3

10 4

10 5

10 6

100 200 300 400 500 600 700 800 900 1000

DFT sizeK

Primes

Radix 2,3,5

Radix2,3 Murphy’s method Figure 2: DFT complexity using the Cooley-Tukey algorithm and

Murphy’s method Radix2,3,5means thatK =2l13l25l3, wherel10,

l20, andl3> 0.

respectively As can be seen, the number of required real

multiplications is very high, for example, if the DFT size is a

prime number Murphy’s method provides a low number of

multiplications for a specific set of composite non

power-of-two values ofK with factors 2, 3, or 5 However, the number

of feasibleK values reported in [15] is only 45 while the DFT

size ranges from 10 to 1024

3 SCiFI-FDMA

The motivation for an alternative generic method to generate

a localized mode SC-FDMA signal originates from the

observations discussed inSection 2.2 It is difficult to find an

efficient implementation for arbitrary values of K Our idea

is to apply a novel processing structure, called SCiFI-FDMA,

shown inFigure 3 It is based on the operation by a specific

M1× K transform matrix Q (M1 = γK, where γ ∈ {2, 3}),

a fractional time-domain interpolation, and a user-specific

frequency shift

The matrix multiplication z = Qx can be considered

as the frequency-domain interpolation by theγ-factor This

results in a limitation, where theK value can only be varied

from 1 to  M/γ  Here, the cases of γ = 2 and γ = 3

are studied, which may slightly limit the maximum band

allocation The overcoming of this limitation is considered

as an additional future study

The transform matrix Q is constructed by allocating

the output of the K-point DFT into the first (K + 1)/2 

and the last (K − 1)/2  (here · and · denote ceil

and floor operations, resp.) bins of the M1-point IDFT

This bin allocation results in a very simplified transform

matrix leading to computational savings The time-domain

interpolation increases the number of samples from M1

to the final block length of M samples This calls for a

.

Q

x

z

.

P/S Fractional

interpolation

e jφ[n]

y

Figure 3: An alternative structure (SCiFI-FDMA) for the realiza-tion of the localized mode SC-FDMA signal

fractional interpolation unless M1 is a power-of-two Due

to the proposed bin allocation, the spectrum of a user is centered around the zero-frequency (exactly around zero for odd values ofK and only half a bin to the right of zero for

even values of K) resulting in efficient interpolation The baseband signal format enables fractional interpolation with real-valued anti-imaging filter The last processing element implements the user-specific frequency shift

e jφ[n] = K

Mexp



j2πn M

 K −

1

wheren =0, 1, , M −1 andξ is the subcarrier allocation

offset This frequency shift translates the user spectrum to its scheduled user-specific position in the system band

3.1 Transform Matrix The transform matrix Q defines the

input-output relation of theK-point DFT and the M1-point IDFT for the given zero-centered bin allocation ThisM1× K

matrix can be expressed as

where the elements of theuth row and the vth column in the

DFT and IDFT matrices are defined as

[WDFT]u,v = e − j((2π/K)uv), u, v =0, 1, , K −1,

[WIDFT]u,v = 1

M1e j((2π/M1 )uv), u, v =0, 1, , M11,

(6)

respectively Moreover, P denotes anM1× K expansion and

permutation matrix that controls the selection of active bins

The transform matrix Q has an efficient structure when

matrix P is selected according to

eT

1

eT

− − − − −

0(M 1− K) × K

− − − − −

eT n+1

eT

Trang 4

where 0 is the (M1− K) × K zero matrix, n = (K + 1)/2 ,

and ei =[0· · ·0 1 0· · ·0]T denotes theith K ×1 natural

basis vector (with one as theith element).

With the given IDFT bin allocation, the Q matrix consists

ofγ interlaced K × K circulant matrices Submatrices R i, for

i = 0, 1, , γ −1, can be extracted from the Q matrix by

picking up everyγth row (from top to down) with offsets of

i rows, that is,

[Ri]u,v =[Q]γu+i,v, u, v =0, 1, , K −1. (8)

Furthermore, each of these circulant matrices is fully

charac-terized by its first column vector ri =Rie1 The other column

vectors are obtained as rotations of ri[16] As an example,

the structure of a 3K × K (γ =3) transform matrix is shown

below:

a0 a1 · · · a K −2 a K −1

b0 b1 · · · b K −2 b K −1

· · · ·

a K −1 a0 · · · a K −3 a K −2

b K −1 b0 · · · b K −3 b K −2

· · · ·

· · · ·

a1 a2 · · · a K −1 a0

b1 b2 · · · b K −1 b0

. (9)

The coefficients on the second row of Q matrix can be

expressed as a v = [R1]0,v forv = 0, 1, , K −1, whereas

the coefficients on the third row of Q matrix are b v =[R2]0,v

The rest of the coefficients are determined by cyclic rotations

according to the definition of a circular matrix

3.1.1 E fficient Implementation of Matrix Multiplication Let

us now consider the transformed vector z It comprises of

γ interlaced subvectors z i(meaning thatz(γu + i) = z i(u)),

each of which is the outcome of the matrix multiplication

zi =Rix can be identified as a circular (cyclic) convolution

between ri and x leads to an efficient frequency-domain

realization The circular convolution is the IDFT of the

product of the DFTs of two length-K vectors [17], that is,

zi =ri x=IDFT(DFT(ri)·DFT(x)). (10)

However, we target to replace the IDFT (DFT) by the IFFT

(FFT) because of the reduced complexity IfK is a

power-of-two then this follows straightforwardly For other values ofK,

vectors riand x are zero-padded (by adding tailing zeros) to

form the length-K vectorsr andx, whereK is the smallest

power-of-two value greater than 2K −1 (Another option

is to use length-K2 DFT, where K2 is the smallest integer value greater than 2K −1, when it can be implemented more efficiently using the Cooley-Tukey algorithm or Murphy’s method) Now,



zi =IFFT(FFT(ri)·FFT(x)) (11) represents actually linear convolution instead of circular convolution Fortunately, there is a relationship between circular convolution and linear convolution as mentioned in [17] Therefore, we can obtain circular convolution by using the following equation:

zi(l) = zi(l) +zi(l + K), l =0, 1, , K −1. (12)

matrix multiplication z = Qx The first branch is simpler

than the others because the first submatrix R0is an identity matrix For other branches, the input vector is first zero-padded to a length of K1 samples and transformed to the frequency domain Then, the resulting vector is multiplied element-wise by a length-K1 vector Φi, which can be obtained by the FFT ofri, and the result is transformed back

to the time domain The L2C-block denotes the conversion from linear convolution to circular convolution Finally, the

vectors ziare interlaced to form the output vector z This is

done by using upsamplers and a delay-chain like in a typical polyphase implementation

It should be pointed out that the coefficients of the vectorsΦi, wherei =1, 2, , γ −1, can be pre-calculated for each desired combination ofK and γ parameters and stored

in a look-up table for run-time access

3.2 Fractional Interpolation Fractional interpolation can

be performed straightforwardly by using a cascade of upsampling by L, image-rejection/anti-alias filtering, and

downsampling by D [18] However, this approach is not the most practical one because it requires a large amount

of unnecessary calculations since only everyDth sample is

finally preserved A more efficient technique for fractional interpolation is to use polynomial-based interpolation filters, that is, filters having a piece-wise polynomial impulse response

The modified Farrow structure, shown in Figure 5, provides an attractive realization for polynomial-based inter-polation filters [19] The input signal is filtered withM p+ 1 parallel real-valued symmetric/antisymmetric FIR filters of order N (with coe fficients c m,n, where m = 0, 1, , M p

and n = 0, 1, , N), to obtain the output samples of

the branch filters C m(z) The interpolated sample value is

obtained by multiplying output samples by so-called basis multipliers (α(μ)) m = (2μ −1)m, for m = 0, 1, , M p, and summing all up Here, M p defines the polynomial-order of the interpolation filter andα(μ) is the

continuous-valued parameter, so-called fractional interval, that controls the time difference between the desired time instant for the interpolated output sample and the previous time instant where the discrete-time input sample exists

Trang 5

γ K

+

M1

z −1

K1

K1 -point FFT

Φ1

× K1 -point

K

.

Φ2

× K1 -point

K γ

z −1

+

.

Φγ−1

× K1 -point

K γ

z −1

Figure 4: Efficient implementation of the matrix multiplication z=Qx is based on the cyclic convolution in the frequency domain.

C M p,0

z −1

z −1

C M

) C M p,N−1

C M p,N

+

+

C2

C1

C0

α(μ)

Figure 5: Modified Farrow structure

3.2.1 Simplified Version of Modified Farrow Structure The

parameters of the modified Farrow structure could be tuned

for different pairs of M1andM in order to obtain the best

tradeoff between performance and complexity However, we

have observed that the polynomial-order of two, M p = 2,

provides sufficiently good performance with arbitrary values

ofM1even if the length of the branch filters is kept relatively

short, that is, N + 1 ≤ 10 Naturally, the branch filter

coefficients have to be pre-optimized and stored in a

look-up table for every pair ofM1andM for run-time execution.

In order to guarantee interpolation where the incoming

values are preserved and new values are generated between

the original ones, the piece-wise polynomial impulse

response should form a Nyquist filter This Nyquist property

results in an additional simplification in the modified Farrow

structure because now different branch filters have a special relationship If themth branch filter is written as

C m(z) =

N



n =0

c m,n z − n, (13)

the filter coefficients are expressed as follows:

c2,n= c2,N− n,

c1,n=

0.5, ifn = N −1

2 ,

0.5, ifn = N + 1

2 ,

0, otherwise,

c0,n=

0.5 − c2,n, ifn = N −1

2 orn = N + 1

2 ,

− c2,n, otherwise.

(14)

Basically, there are only (N + 1)/2 coe fficients, c2,n for

n =0, 1, , (N −1)/2, to be optimized Moreover, it is quite

easy to optimize these coefficients in such a manner that they directly have a sum-of-power-of-two representation This means that a multiplication can be replaced by simple shifts and additions The actual optimization of the filter coefficients is out of the scope of this paper, however, an interested reader can find more details in [20, 21] and references therein

4 Computational Complexity

The computational complexity of DFT-S-OFDMA and SCiFI-FDMA are evaluated by calculating the number of real

Trang 6

multiplications (θ) that is required to compute length-M

complex-valued output sequence The number of real

addi-tions (φ) is also roughly estimated although multiplications

are dominant with regard to the complexity DFT-S-OFDMA

consists of the K-point DFT, subcarrier mapping, and the

M-point IFFT The subcarrier mapping does not require any

multiplications, so the complexity results from the transform

blocks The total number of real multiplications for the

DFT-S-OFDMA structure (assuming the Cooley-Tukey and

the Split-Radix algorithms) is

θ R = θDFT+θIFFT, (15) where

θDFT=

K

i

k i l i

⎠ ·3, K =

i

k l i

i,

θIFFT= M

log2(M) −3

+ 4.

(16)

The total number of real multiplications for

SCiFI-FDMA is the sum of the multiplications in each

processing block; the matrix multiplication (θMM), the

modified Farrow structure (θFA), and the user-specific

frequency shift (θFS):

θ S = θMM+θFA+θFS, (17) where

θMM= γ

K1



log2(K1)3

+ 4

+

γ −1

K1·3,

θFA= M1N + 1

2 ·2 + 2M ·2,

θFS= M ·3.

(18)

The efficient implementation of the matrix multiplication

consists of one FFT and γ −1 IFFTs In addition, γ −1

element-wise length-K1 vector multiplications are required

The modified Farrow structure only consists of (N + 1)/2

different branch filter coefficients (if trivial multiplications

by 0.5 are omitted) and base multipliers α(μ) The frequency

shift requiresM complex multiplications.

In the case of DFT-S-OFDMA, the number of real

additions is calculated using

φ R = φDFT+φIFFT, (19) where

φDFT=

K

i

k i l i

⎠ ·3, K =

i

k l i

i,

φIFFT=3M

log2(M) −1

+ 4.

(20)

For SCiFI-FDMA

φ S = φMM+φFA+φFS, (21)

10 4

10 5

10 6

50 100 150 200 250 300 350 400 450 500

K

θ R

θ R2

θ S(γ =2)

θ S(γ =3) Multiple of 12

Figure 6: Number of real multiplications for DFT-S-OFDMA (θR

andθ R2) and SCiFI-FDMA (θS=2) andθ S=3))

where

φMM= γ

3K1



log2(K1)1

+ 4

+

γ −1

K1·3 +

γ −1

(K −1)·2,

φFA= M1N ·2 +M13·2 +M p M ·2,

φFS= M ·3.

(22)

The following set of parameters is used for the numerical complexity analysis: M = 1024, K = 1, 2, ,  M/γ with

γ ∈ {2, 3},K1is the next power-of-two value greater than

2K −1, M1 = γK, M p = 2, and N = 5 The effect

of the γ-factor on the performance will be discussed in

multiplications and additions as a function of increasingK,

respectively The complexities of DFT-S-OFDMA (θ R,φ R) and SCiFI-FDMA (θ S,φ S) are calculated using (15)–(22) In addition, a number of discrete points (θ R2,φ R2) indicate the DFT-S-OFDMA complexity when the DFT part is estimated using Murphy’s table given in [15] As for theθ Randθ R2, the points that correspond to multiples of 12 are indicated by circle markers

As can be seen, the complexity of DFT-S-OFDMA is a strongly fluctuating function of K when the performance

over the whole range ofK = 1, 2, ,  M/γ is considered Clearly, there are tempting values of K that yield low

complexity, whereas, for example, prime values ofK result

in overwhelming complexity On the other hand, SCiFI-FDMA provides a solution that adds flexibility by allowing moderate and smooth complexity over the whole range of

K values If K is a power-of-two, then the term θMM in (18) is evaluated by substituting K for K1 This results in the downward pointing spikes inFigure 6 The number of

Trang 7

10 4

10 5

10 6

50 100 150 200 250 300 350 400 450 500

K

φ R

φ R2

φ S(γ =2)

φ S(γ =3) Figure 7: Number of real additions for DFT-S-OFDMA (φR and

φ R2) and SCiFI-FDMA (φS=2) andφ S=3))

additions can be quite high for larger values ofK but this is

typically not considered as a problem, because adders are less

costly to implement than multipliers

of DFT-S-OFDMA and SCiFI-FDMA for three sets of K

values The first set (multiples of 12 with radix {2, 3, 5})

clearly favors the DFT-S-OFDMA implementation As for

the second set (other multiples of 12), the relative

per-formance depends on the K value considered and the

difference in complexity fluctuates (+/) for the benefit

of either structure The third set of arbitrarily chosen

points shows the potential of the SCiFI-FDMA structure

In general, a small set of points that favors either

DFT-S-OFDMA or SCiFI-FDMA can easily be chosen

There-fore, it is necessary to consider the performance over

the full range of K = 1, 2, ,  M/γ  The SCiFI-FDMA

structure is shown to provide lower complexity for 52%

(γ =3) and 81% (γ =2) of cases over the full set ofK values.

When the branch filter coefficients of the modified Farrow

structure have a sum-of-power-of-two representation these

numbers increase to 63% (γ = 3) and 89% (γ = 2),

respectively

Regarding the memory consumption of a practical

implementation, it should be noted that the following

components can be stored in a memory for the run-time

access for each value ofK:

(i)γ −1 vectorsΦiof length-K1,

(ii) (N + 1)/2 pre-optimized Farrow coe fficients c2,n

5 Performance Evaluation

In this section, we compare the DFT-S-OFDMA and

SCiFI-FDMA techniques for implementing an equivalent

Table 1: Number of required multiplications for specific values of

K for DFT-S-OFDMA (θ R/R2) and SCiFI-FDMA (θS=2))

SC-FDMA uplink transmission The comparison is per-formed by evaluating the approximation error introduced by the SCiFI-FDMA transmitter processing The impact of the approximation error is studied both in a single-user case and

in a multi-user case

5.1 Single-User Case We begin the analysis by considering

the approximation error in a single-user case The relevant SCiFI-FDMA parameters for this numerical example are as follows:

N =5, M p =2, γ ∈ {2, 3} (23)

The influence of the approximation error is analyzed through the detection of a SCiFI-FDMA synthesized uplink signal at the receiver side of the link Here, the signal transmission

is assumed to be ideal in a sense that the effects of channel distortion and additive noise are not considered and perfect time synchronization is assumed Moreover, the receiver processing is based on the reference structure (DFT-S-OFDMA) consisting of theM-point FFT, subcarrier

selection, and the K-point IDFT Therefore, the potential

non-idealities of the SCiFI-FDMA processing form the only source of errors in the considered example Figures 8 and

9 show the received signal constellation obtained using the SCiFI-FDMA transmitter with initial frequency-domain upsampling factor of γ = 2 and γ = 3, respectively In the case of DFT-S-OFDMA, the received symbol estimates coincide with the ideal constellation points, whereas for SCiFI-FDMA they disperse slightly around the ideal points due to the approximation error introduced by the time-domain fractional interpolation

The error vector magnitude (EVM) is a well-defined and widely adopted metric to measure the signal quality/purity

Trang 8

1

0.5

0

0.5

1

1.5

In-phase

0.3

0.305

0.31

0.315

0.32

0.325

0.33

0.3 0.31 0.32 0.33

In-phase SCiFI-FDMA

16-QAM

Figure 8: Dispersion of the received signal constellation due to

fractional interpolation (γ=2)

In order to estimate the average signal distortion due to the

approximation error, the EVM is evaluated according to [22]:





E

!

!x[n] − x[n]!!2"

E | x[n] |2"



1/N sN s

n =1!!x[n] − x[n]!!2

1/N s

N s

n =1| x[n] |2 ,

(24) where E {·}, x[n], x[n], and N s denote the expectation

of ensemble averages, the actual (measured) and the ideal

symbols, and the length of the symbol sequence, respectively

Moreover, the mean-squared error is normalized by the

average power of the ideal signal It should be emphasized

that the level of EVM can be controlled by adjusting

the SCiFI-FDMA parameters γ, M p, and N This allows

different complexity-performance trade-offs in the actual

system design.Figure 10shows the evaluated (average) EVM

for SCiFI-FDMA with varying DFT size K It can be

observed that the resulting EVM of SCiFI-FDMA is below

40 dB or52 dB, over the whole range of K values, for

γ = 2 andγ = 3, respectively Therefore, as the estimated

level of EVM is well below the level of thermal noise

encoun-tered in practise, the BER performance would dominantly be

determined by the SNR operation point instead of the signal

dispersion by the fractional interpolation

5.2 Multi-User Case In a multi-user case, the other users

can be considered as possible sources of multiple access

interference (MAI) due to non-ideal spectral nulls of

SCiFI-FDMA synthesized signals MAI degrades the

detec-tion performance of a specific uplink signal, thus it was

numerically estimated from the received compound signal at

the base station receiver A multiple access reception of ten

simultaneous uplink users with consecutive allocations in the

signal band (with neighboring, non-overlapping frequency

1.5

1

0.5

0

0.5

1

1.5

In-phase

0.3

0.305

0.31

0.315

0.32

0.325

0.33

0.3 0.31 0.32 0.33

In-phase SCiFI-FDMA

16-QAM Figure 9: Dispersion of the received signal constellation due to fractional interpolation (γ=3)

80

70

60

50

40

30

20

0 50 100 150 200 250 300 350 400 450 500

DFT sizeK

γ =2

γ =3 Figure 10: EVM over a range of the DFT sizeK.

bins) was considered Furthermore, the uplink transmission was assumed to be ideal both in timing and power control From the single-user detection point of view, the other uplink users can be seen as additive noise sources In order

to estimate the variance of MAI, the mean-squared error (MSE) can be estimated, at the frequency bins allocated to

a selected user being detected at a given time, while there are transmissions on the rest of the frequency bins allocated for the rest of the uplink users The average MSE was estimated over a set of one hundred random MA profiles (each with a randomly picked sequence of the DFT sizes and modulation

Trang 9

orders of {4, 16, 64} QAM alphabets for all uplink users).

Moreover, all the considered MA profiles were full bandwidth

scenarios, that is, the DFT sizes allocated for the ten users

summed up to the bandwidth of the IFFT sizeM As a result,

the level of the additive MAI was estimated to be42 dB and

52 dB for the design withγ =2 andγ =3, respectively

6 Conclusions

In this paper, SCiFI-FDMA was proposed as a potential

implementation structure for the wideband uplink

trans-mission in a future communication system SCiFI-FDMA

is based on frequency and time domain interpolation

and a user-specific frequency shift It was shown that the

SCiFI-FDMA structure is able to generate signal waveforms

comparable to those obtained with DFT-S-OFDMA The

main advantages of SCiFI-FDMA are its enhanced flexibility

to the generic choice of allocated bandwidth per user and its

competitive computational complexity

In this paper, the performance was analyzed using

exper-imentally chosen parameter values to satisfy the expected

requirements of a communication system Naturally, the

parameters can further be fine-tuned and filters re-optimized

depending on the targeted performance Based on its

charac-teristics, the SCiFI-FDMA offers attractive trade-offs for the

synthesis of SC-FDMA waveforms

Acknowledgments

This research was supported by Nokia (project Waveform

Analysis for Cellular Systems) Moreover, Tero Ihalainen

would like to thank Tampere Graduate School in

Informa-tion Science and Engineering (TISE) for financial support

during this research

References

[1] 3GPP TR 25.814 V7.0.0, “Physical layer aspects for evolved

UTRA,” (Release 7), June 2006

[2] R van Nee and R Prasad, OFDM for Wireless Multimedia

Communications, Artech House, London, UK, 2000.

[3] H G Myung, J Lim, and D J Goodman, “Single carrier

FDMA for uplink wireless transmission,” IEEE Vehicular

Technology Magazine, vol 1, no 3, pp 30–38, 2006.

[4] H Sari, G Karam, and I Jeanclaude, “Transmission

tech-niques for digital terrestrial TV broadcasting,” IEEE

Commu-nications Magazine, vol 33, no 2, pp 100–109, 1995.

[5] D Falconer, S L Ariyavisitakul, A Benyamin-Seeyar, and

B Eidson, “Frequency domain equalization for single-carrier

broadband wireless systems,” IEEE Communications Magazine,

vol 40, no 4, pp 58–66, 2002

[6] D Galda and H Rohling, “A low complexity transmitter

structure for OFDM-FDMA uplink systems,” in Proceedings of

the 55th IEEE Vehicular Technology Conference (VTC ’02), vol.

4, pp 1737–1741, Birmingham, Ala, USA, May 2002

[7] R Dinis, D Falconer, C T Lam, and M Sabbaghian, “A

multiple access scheme for the uplink of broadband wireless

systems,” in Proceedings of IEEE Global Telecommunications

Conference (GLOBECOM ’04), vol 6, pp 3808–3812, Dallas,

Tex, USA, November-December 2004

[8] X Zhang, M Li, H Hu, H Wang, B Zhou, and X You,

“DFT spread generalized multi-carrier scheme for broadband

mobile communications,” in Proceedings of the 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’06), pp 1–5, Helsinki, Finland,

September 2006

[9] T Frank, A Klein, E Costa, and E Schulz, “Robustness of IFDMA as air interface candidate for future high rate mobile

radio systems,” Advances in Radio Science, vol 3, pp 265–270,

2005

[10] 3GPP TSG-RAN WG1 #47, “R1-063127: DFT size for uplink transmissions,” November 2006

[11] T Pollet, M Van Bladel, and M Moeneclaey, “BER sensitivity

of OFDM systems to carrier frequency offset and Wiener phase

noise,” IEEE Transactions on Communications, vol 43, no 234,

pp 191–193, 1995

[12] H S Malvar, Signal Processing with Lapped Transforms, Artech

House, Boston, Mass, USA, 1992

[13] R E Blahut, Fast Algorithms for Digital Signal Processing,

Addison-Wesley, Reading, Mass, USA, 2nd edition, 1987

[14] S K Mitra and J F Kaiser, Handbook for Digital Signal Processing, John Wiley & Sons, New York, NY, USA, 1993.

[15] C D Murphy, “Low-complexity FFT structures for OFDM

transceivers,” IEEE Transactions on Communications, vol 50,

no 12, pp 1878–1881, 2002

[16] G H Golub and C F van Loan, Matrix Computations, The

Johns Hopkins University Press, London, UK, 3rd edition, 1996

[17] A V Oppenheim and R W Schafer, Discrete-Time Signal Processing, Prentice-Hall, Englewood Cliffs, NJ, USA, 1989 [18] R E Crochiere and L R Rabiner, Multirate Digital Signal Processing, Prentice-Hall, Englewood Cliffs, NJ, USA, 1983.

[19] J Vesma and T Saram¨aki, “Interpolation filters with arbitrary

frequency response for all-digital receivers,” in Proceedings

of IEEE International Symposium on Circuits and Systems (ISCAS ’96), vol 2, pp 568–571, Atlanta, Ga, USA, May 1996 [20] J Vesma, Optimization and applications of polynomial-based interpolation filters, Doctoral dissertation, Tampere University

of Technology, Tampere, Finland, May 1999

[21] J Vesma, “A frequency-domain approach to polynomial-based

interpolation and the farrow structure,” IEEE Transactions on Circuits and Systems II, vol 47, no 3, pp 206–209, 2000 [22] Q Gu, RF System Design of Transceivers for Wireless Commu-nications, Springer, New York, NY, USA, 2005.

Ngày đăng: 21/06/2014, 22:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN